Executive Summary
Summary | |
---|---|
Title | kernel security and bug fix update |
Informations | |||
---|---|---|---|
Name | RHSA-2019:2473 | First vendor Publication | 2019-08-13 |
Vendor | RedHat | Last vendor Modification | 2019-08-13 |
Severity (Vendor) | N/A | Revision | 01 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:L/AC:L/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 7.2 | Attack Range | Local |
Cvss Impact Score | 10 | Attack Complexity | Low |
Cvss Expoit Score | 3.9 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Problem Description: An update for kernel is now available for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Desktop (v. 6) - i386, noarch, x86_64 Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux HPC Node (v. 6) - noarch, x86_64 Red Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, noarch, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, noarch, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64 3. Description: The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * Kernel: page cache side channel attacks (CVE-2019-5489) * kernel: Salsa20 encryption algorithm does not correctly handle zero-length inputs allowing local attackers to cause denial-of-service (CVE-2017-17805) * kernel: Unprivileged users able to inspect kernel stacks of arbitrary tasks (CVE-2018-17972) * kernel: hw: Spectre SWAPGS gadget vulnerability (CVE-2019-1125) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * OOPS with Null Pointer exception in v4l2_ctrl_query_menu when second arg of function is NULL (BZ#1647975) * Another RHEL 6 hang in congestion_wait() (BZ#1658254) * kernel crash after running user space script (BZ#1663262) * RHEL-6.10: Don't report the use of retpoline on Skylake as vulnerable (BZ#1666102) * Bad pagetable: 000f “*pdpt = 0000000000000000 *pde = 0000000000000000†RHEL 6 32bit (BZ#1702782) * fs/binfmt_misc.c: do not allow offset overflow [6.10.z] (BZ#1710149) * Wrong spectre backport causing linux headers to break compilation of 3rd party packages (BZ#1722185) 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 The system must be rebooted for this update to take effect. 5. Bugs fixed (https://bugzilla.redhat.com/): 1528312 - CVE-2017-17805 kernel: Salsa20 encryption algorithm does not correctly handle zero-length inputs allowing local attackers to cause denial-of-service 1636349 - CVE-2018-17972 kernel: Unprivileged users able to inspect kernel stacks of arbitrary tasks 1664110 - CVE-2019-5489 Kernel: page cache side channel attacks 1724389 - CVE-2019-1125 kernel: hw: Spectre SWAPGS gadget vulnerability |
Original Source
Url : https://rhn.redhat.com/errata/RHSA-2019-2473.html |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
33 % | CWE-362 | Race Condition |
33 % | CWE-319 | Cleartext Transmission of Sensitive Information |
33 % | CWE-20 | Improper Input Validation |
CPE : Common Platform Enumeration
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2019-01-03 | Name : The remote Fedora host is missing one or more security updates. File : fedora_2018-9f4381d8c4.nasl - Type : ACT_GATHER_INFO |
2019-01-03 | Name : The remote Fedora host is missing one or more security updates. File : fedora_2018-ec3bf1b228.nasl - Type : ACT_GATHER_INFO |
2018-11-16 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2018-3083.nasl - Type : ACT_GATHER_INFO |
2018-11-09 | Name : The remote Amazon Linux 2 host is missing a security update. File : al2_ALAS-2018-1100.nasl - Type : ACT_GATHER_INFO |
2018-11-08 | Name : The remote Amazon Linux AMI host is missing a security update. File : ala_ALAS-2018-1100.nasl - Type : ACT_GATHER_INFO |
2018-10-17 | Name : The remote Fedora host is missing one or more security updates. File : fedora_2018-2ee3411cb8.nasl - Type : ACT_GATHER_INFO |
2018-09-18 | Name : The remote EulerOS Virtualization host is missing multiple security updates. File : EulerOS_SA-2018-1232.nasl - Type : ACT_GATHER_INFO |
2018-01-29 | Name : The remote EulerOS host is missing multiple security updates. File : EulerOS_SA-2018-1031.nasl - Type : ACT_GATHER_INFO |
2018-01-19 | Name : The remote EulerOS host is missing multiple security updates. File : EulerOS_SA-2018-1026.nasl - Type : ACT_GATHER_INFO |
2018-01-10 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-4082.nasl - Type : ACT_GATHER_INFO |
2018-01-08 | Name : The remote Debian host is missing a security update. File : debian_DLA-1232.nasl - Type : ACT_GATHER_INFO |
2017-12-26 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-4073.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2020-03-19 13:18:59 |
|